Real world patterns of failure in anonymity systems

13Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present attacks on the anonymity and pseudonymity provided by a "lonely hearts" dating service and by the HushMail encrypted email system. We move on to discuss some generic attacks upon anonymous systems based on the engineering reality of these systems rather than the theoretical foundations on which they are based. However, for less sophisticated users it is social engineering attacks, owing nothing to computer science, that pose the biggest day-to-day danger. This practical experience then permits a start to be made on developing a security policy model for pseudonymous communications.

Cite

CITATION STYLE

APA

Clayton, R., Danezis, G., & Kuhn, M. G. (2001). Real world patterns of failure in anonymity systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2137, pp. 230–245). Springer Verlag. https://doi.org/10.1007/3-540-45496-9_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free